2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High P 2016
DOI: 10.1109/bigdatasecurity-hpsc-ids.2016.50
|View full text |Cite
|
Sign up to set email alerts
|

Trust Issues for Big Data about High-Value Manufactured Parts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Supporting technologies for artificial intelligence include big data analytics, decision making, and natural language processing. The potential applications of big data analytics in analyzing the digital thread to enhance manufacturing processes and reduce costs are discussed in [105]. Through natural language processing techniques, textual data can be processed and understood, transforming them into system models while ensuring the accuracy, consistency, and completeness of the models.…”
Section: Enabling Lifecycle Lightweight Interaction Through Surrogate...mentioning
confidence: 99%
“…Supporting technologies for artificial intelligence include big data analytics, decision making, and natural language processing. The potential applications of big data analytics in analyzing the digital thread to enhance manufacturing processes and reduce costs are discussed in [105]. Through natural language processing techniques, textual data can be processed and understood, transforming them into system models while ensuring the accuracy, consistency, and completeness of the models.…”
Section: Enabling Lifecycle Lightweight Interaction Through Surrogate...mentioning
confidence: 99%
“…Furthermore, the users do not know their critical data and their data security. That's why customers do not trust cloud computing services and prefer to store their critical data on their own IT system at home instead of the cloud 8,11,23,24,33,35 …”
Section: Literature Reviewmentioning
confidence: 99%
“…So that's why customer do not trust on cloud computing and refer to store their personal data on their own system at home instead of cloud environment [8,12,25,35,42,43]. Technical Network issue: In cloud computing data communication occur through unsecured network such as Internet, where every node can easily change data or inter node communication so that to breach the entire connection of the system [16,42,44,45]. Un-controlled access of Data: In cloud computing all the nodes are inter linked with each other for data processing.…”
Section: Introductionmentioning
confidence: 99%